pulumi-snowflake 0.50.3a1710160126__py3-none-any.whl → 1.2.0a1736849992__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-snowflake might be problematic. Click here for more details.

Files changed (182) hide show
  1. pulumi_snowflake/__init__.py +224 -172
  2. pulumi_snowflake/_inputs.py +52857 -1665
  3. pulumi_snowflake/_utilities.py +41 -5
  4. pulumi_snowflake/account.py +188 -218
  5. pulumi_snowflake/account_authentication_policy_attachment.py +149 -0
  6. pulumi_snowflake/account_parameter.py +21 -48
  7. pulumi_snowflake/account_password_policy_attachment.py +7 -32
  8. pulumi_snowflake/account_role.py +250 -0
  9. pulumi_snowflake/alert.py +38 -47
  10. pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +704 -0
  11. pulumi_snowflake/api_authentication_integration_with_client_credentials.py +657 -0
  12. pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +692 -0
  13. pulumi_snowflake/api_integration.py +33 -52
  14. pulumi_snowflake/authentication_policy.py +622 -0
  15. pulumi_snowflake/config/__init__.pyi +76 -99
  16. pulumi_snowflake/config/outputs.py +5 -0
  17. pulumi_snowflake/config/vars.py +93 -124
  18. pulumi_snowflake/cortex_search_service.py +596 -0
  19. pulumi_snowflake/database.py +819 -213
  20. pulumi_snowflake/database_role.py +81 -44
  21. pulumi_snowflake/dynamic_table.py +42 -49
  22. pulumi_snowflake/email_notification_integration.py +33 -28
  23. pulumi_snowflake/{unsafe_execute.py → execute.py} +36 -39
  24. pulumi_snowflake/external_function.py +54 -75
  25. pulumi_snowflake/external_oauth_integration.py +593 -542
  26. pulumi_snowflake/external_table.py +67 -90
  27. pulumi_snowflake/external_volume.py +382 -0
  28. pulumi_snowflake/failover_group.py +57 -98
  29. pulumi_snowflake/file_format.py +33 -28
  30. pulumi_snowflake/function_java.py +1211 -0
  31. pulumi_snowflake/function_javascript.py +882 -0
  32. pulumi_snowflake/function_python.py +1212 -0
  33. pulumi_snowflake/function_scala.py +1212 -0
  34. pulumi_snowflake/function_sql.py +835 -0
  35. pulumi_snowflake/get_account_roles.py +129 -0
  36. pulumi_snowflake/get_accounts.py +53 -22
  37. pulumi_snowflake/get_alerts.py +22 -9
  38. pulumi_snowflake/get_connections.py +109 -0
  39. pulumi_snowflake/get_cortex_search_services.py +216 -0
  40. pulumi_snowflake/get_current_account.py +24 -13
  41. pulumi_snowflake/get_current_role.py +14 -7
  42. pulumi_snowflake/get_database.py +25 -9
  43. pulumi_snowflake/get_database_role.py +162 -0
  44. pulumi_snowflake/get_database_roles.py +79 -47
  45. pulumi_snowflake/get_databases.py +91 -73
  46. pulumi_snowflake/get_dynamic_tables.py +36 -19
  47. pulumi_snowflake/get_external_functions.py +28 -9
  48. pulumi_snowflake/get_external_tables.py +28 -9
  49. pulumi_snowflake/get_failover_groups.py +18 -7
  50. pulumi_snowflake/get_file_formats.py +28 -9
  51. pulumi_snowflake/get_functions.py +28 -9
  52. pulumi_snowflake/get_grants.py +207 -84
  53. pulumi_snowflake/get_masking_policies.py +91 -51
  54. pulumi_snowflake/get_materialized_views.py +28 -9
  55. pulumi_snowflake/get_network_policies.py +129 -0
  56. pulumi_snowflake/get_parameters.py +38 -15
  57. pulumi_snowflake/get_pipes.py +28 -9
  58. pulumi_snowflake/get_procedures.py +28 -9
  59. pulumi_snowflake/get_resource_monitors.py +37 -24
  60. pulumi_snowflake/get_row_access_policies.py +91 -51
  61. pulumi_snowflake/get_schemas.py +145 -41
  62. pulumi_snowflake/get_secrets.py +200 -0
  63. pulumi_snowflake/get_security_integrations.py +129 -0
  64. pulumi_snowflake/get_sequences.py +28 -9
  65. pulumi_snowflake/get_shares.py +18 -9
  66. pulumi_snowflake/get_stages.py +28 -9
  67. pulumi_snowflake/get_storage_integrations.py +16 -9
  68. pulumi_snowflake/get_streamlits.py +170 -0
  69. pulumi_snowflake/get_streams.py +114 -54
  70. pulumi_snowflake/get_system_generate_scim_access_token.py +18 -9
  71. pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +32 -7
  72. pulumi_snowflake/get_system_get_private_link_config.py +120 -5
  73. pulumi_snowflake/get_system_get_snowflake_platform_info.py +15 -7
  74. pulumi_snowflake/get_tables.py +28 -9
  75. pulumi_snowflake/get_tags.py +130 -0
  76. pulumi_snowflake/get_tasks.py +134 -54
  77. pulumi_snowflake/get_users.py +116 -44
  78. pulumi_snowflake/get_views.py +114 -54
  79. pulumi_snowflake/get_warehouses.py +79 -26
  80. pulumi_snowflake/grant_account_role.py +28 -75
  81. pulumi_snowflake/grant_application_role.py +257 -0
  82. pulumi_snowflake/grant_database_role.py +35 -94
  83. pulumi_snowflake/grant_ownership.py +382 -0
  84. pulumi_snowflake/grant_privileges_to_account_role.py +42 -78
  85. pulumi_snowflake/grant_privileges_to_database_role.py +37 -383
  86. pulumi_snowflake/grant_privileges_to_share.py +96 -44
  87. pulumi_snowflake/legacy_service_user.py +3670 -0
  88. pulumi_snowflake/managed_account.py +40 -11
  89. pulumi_snowflake/masking_policy.py +213 -310
  90. pulumi_snowflake/materialized_view.py +62 -71
  91. pulumi_snowflake/network_policy.py +217 -61
  92. pulumi_snowflake/network_policy_attachment.py +5 -34
  93. pulumi_snowflake/network_rule.py +473 -0
  94. pulumi_snowflake/notification_integration.py +49 -84
  95. pulumi_snowflake/oauth_integration_for_custom_clients.py +906 -0
  96. pulumi_snowflake/{oauth_integration.py → oauth_integration_for_partner_applications.py} +191 -192
  97. pulumi_snowflake/object_parameter.py +10 -101
  98. pulumi_snowflake/outputs.py +49200 -2928
  99. pulumi_snowflake/password_policy.py +41 -28
  100. pulumi_snowflake/pipe.py +33 -4
  101. pulumi_snowflake/primary_connection.py +330 -0
  102. pulumi_snowflake/procedure_java.py +1273 -0
  103. pulumi_snowflake/procedure_javascript.py +895 -0
  104. pulumi_snowflake/procedure_python.py +1226 -0
  105. pulumi_snowflake/procedure_scala.py +1273 -0
  106. pulumi_snowflake/procedure_sql.py +895 -0
  107. pulumi_snowflake/provider.py +378 -613
  108. pulumi_snowflake/pulumi-plugin.json +2 -1
  109. pulumi_snowflake/resource_monitor.py +118 -327
  110. pulumi_snowflake/row_access_policy.py +200 -149
  111. pulumi_snowflake/{saml_integration.py → saml2_integration.py} +356 -299
  112. pulumi_snowflake/schema.py +949 -178
  113. pulumi_snowflake/scim_integration.py +286 -109
  114. pulumi_snowflake/secondary_connection.py +339 -0
  115. pulumi_snowflake/secondary_database.py +1080 -0
  116. pulumi_snowflake/secret_with_authorization_code_grant.py +548 -0
  117. pulumi_snowflake/secret_with_basic_authentication.py +500 -0
  118. pulumi_snowflake/secret_with_client_credentials.py +511 -0
  119. pulumi_snowflake/secret_with_generic_string.py +452 -0
  120. pulumi_snowflake/sequence.py +9 -34
  121. pulumi_snowflake/service_user.py +3585 -0
  122. pulumi_snowflake/share.py +33 -28
  123. pulumi_snowflake/shared_database.py +939 -0
  124. pulumi_snowflake/stage.py +95 -84
  125. pulumi_snowflake/storage_integration.py +46 -4
  126. pulumi_snowflake/stream_on_directory_table.py +517 -0
  127. pulumi_snowflake/stream_on_external_table.py +632 -0
  128. pulumi_snowflake/stream_on_table.py +666 -0
  129. pulumi_snowflake/stream_on_view.py +666 -0
  130. pulumi_snowflake/streamlit.py +671 -0
  131. pulumi_snowflake/table.py +86 -97
  132. pulumi_snowflake/table_column_masking_policy_application.py +7 -14
  133. pulumi_snowflake/table_constraint.py +29 -172
  134. pulumi_snowflake/tag.py +142 -74
  135. pulumi_snowflake/tag_association.py +40 -215
  136. pulumi_snowflake/task.py +3048 -418
  137. pulumi_snowflake/user.py +3351 -384
  138. pulumi_snowflake/user_authentication_policy_attachment.py +197 -0
  139. pulumi_snowflake/user_password_policy_attachment.py +5 -4
  140. pulumi_snowflake/user_public_keys.py +5 -0
  141. pulumi_snowflake/view.py +466 -215
  142. pulumi_snowflake/warehouse.py +184 -168
  143. {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/METADATA +7 -6
  144. pulumi_snowflake-1.2.0a1736849992.dist-info/RECORD +148 -0
  145. {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/WHEEL +1 -1
  146. pulumi_snowflake/account_grant.py +0 -343
  147. pulumi_snowflake/database_grant.py +0 -495
  148. pulumi_snowflake/external_table_grant.py +0 -690
  149. pulumi_snowflake/failover_group_grant.py +0 -388
  150. pulumi_snowflake/file_format_grant.py +0 -635
  151. pulumi_snowflake/function.py +0 -872
  152. pulumi_snowflake/function_grant.py +0 -745
  153. pulumi_snowflake/get_role.py +0 -121
  154. pulumi_snowflake/get_roles.py +0 -120
  155. pulumi_snowflake/grant_privileges_to_role.py +0 -825
  156. pulumi_snowflake/integration_grant.py +0 -440
  157. pulumi_snowflake/masking_policy_grant.py +0 -542
  158. pulumi_snowflake/materialized_view_grant.py +0 -689
  159. pulumi_snowflake/pipe_grant.py +0 -587
  160. pulumi_snowflake/procedure.py +0 -887
  161. pulumi_snowflake/procedure_grant.py +0 -745
  162. pulumi_snowflake/resource_monitor_grant.py +0 -387
  163. pulumi_snowflake/role.py +0 -273
  164. pulumi_snowflake/role_grants.py +0 -352
  165. pulumi_snowflake/role_ownership_grant.py +0 -338
  166. pulumi_snowflake/row_access_policy_grant.py +0 -540
  167. pulumi_snowflake/schema_grant.py +0 -647
  168. pulumi_snowflake/sequence_grant.py +0 -635
  169. pulumi_snowflake/session_parameter.py +0 -332
  170. pulumi_snowflake/stage_grant.py +0 -635
  171. pulumi_snowflake/stream.py +0 -614
  172. pulumi_snowflake/stream_grant.py +0 -635
  173. pulumi_snowflake/table_grant.py +0 -677
  174. pulumi_snowflake/tag_grant.py +0 -532
  175. pulumi_snowflake/tag_masking_policy_association.py +0 -210
  176. pulumi_snowflake/task_grant.py +0 -635
  177. pulumi_snowflake/user_grant.py +0 -394
  178. pulumi_snowflake/user_ownership_grant.py +0 -286
  179. pulumi_snowflake/view_grant.py +0 -705
  180. pulumi_snowflake/warehouse_grant.py +0 -440
  181. pulumi_snowflake-0.50.3a1710160126.dist-info/RECORD +0 -136
  182. {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -28,19 +33,14 @@ class GrantPrivilegesToAccountRoleArgs:
28
33
  with_grant_option: Optional[pulumi.Input[bool]] = None):
29
34
  """
30
35
  The set of arguments for constructing a GrantPrivilegesToAccountRole resource.
31
- :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
36
+ :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
32
37
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
33
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
34
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
35
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
36
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
37
- of the config being eventually convergent (producing an empty plan).
38
38
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
39
39
  :param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
40
40
  :param pulumi.Input['GrantPrivilegesToAccountRoleOnAccountObjectArgs'] on_account_object: Specifies the account object on which privileges will be granted
41
41
  :param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
42
42
  :param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
43
- :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
43
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
44
44
  :param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
45
45
  """
46
46
  pulumi.set(__self__, "account_role_name", account_role_name)
@@ -67,7 +67,7 @@ class GrantPrivilegesToAccountRoleArgs:
67
67
  @pulumi.getter(name="accountRoleName")
68
68
  def account_role_name(self) -> pulumi.Input[str]:
69
69
  """
70
- The fully qualified name of the account role to which privileges will be granted.
70
+ The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
71
71
  """
72
72
  return pulumi.get(self, "account_role_name")
73
73
 
@@ -90,13 +90,6 @@ class GrantPrivilegesToAccountRoleArgs:
90
90
  @property
91
91
  @pulumi.getter(name="alwaysApply")
92
92
  def always_apply(self) -> Optional[pulumi.Input[bool]]:
93
- """
94
- If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
95
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
96
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
97
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
98
- of the config being eventually convergent (producing an empty plan).
99
- """
100
93
  return pulumi.get(self, "always_apply")
101
94
 
102
95
  @always_apply.setter
@@ -167,7 +160,7 @@ class GrantPrivilegesToAccountRoleArgs:
167
160
  @pulumi.getter
168
161
  def privileges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
169
162
  """
170
- The privileges to grant on the account role.
163
+ The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
171
164
  """
172
165
  return pulumi.get(self, "privileges")
173
166
 
@@ -203,19 +196,14 @@ class _GrantPrivilegesToAccountRoleState:
203
196
  with_grant_option: Optional[pulumi.Input[bool]] = None):
204
197
  """
205
198
  Input properties used for looking up and filtering GrantPrivilegesToAccountRole resources.
206
- :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
199
+ :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
207
200
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
208
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
209
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
210
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
211
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
212
- of the config being eventually convergent (producing an empty plan).
213
201
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
214
202
  :param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
215
203
  :param pulumi.Input['GrantPrivilegesToAccountRoleOnAccountObjectArgs'] on_account_object: Specifies the account object on which privileges will be granted
216
204
  :param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
217
205
  :param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
218
- :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
206
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
219
207
  :param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
220
208
  """
221
209
  if account_role_name is not None:
@@ -243,7 +231,7 @@ class _GrantPrivilegesToAccountRoleState:
243
231
  @pulumi.getter(name="accountRoleName")
244
232
  def account_role_name(self) -> Optional[pulumi.Input[str]]:
245
233
  """
246
- The fully qualified name of the account role to which privileges will be granted.
234
+ The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
247
235
  """
248
236
  return pulumi.get(self, "account_role_name")
249
237
 
@@ -266,13 +254,6 @@ class _GrantPrivilegesToAccountRoleState:
266
254
  @property
267
255
  @pulumi.getter(name="alwaysApply")
268
256
  def always_apply(self) -> Optional[pulumi.Input[bool]]:
269
- """
270
- If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
271
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
272
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
273
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
274
- of the config being eventually convergent (producing an empty plan).
275
- """
276
257
  return pulumi.get(self, "always_apply")
277
258
 
278
259
  @always_apply.setter
@@ -343,7 +324,7 @@ class _GrantPrivilegesToAccountRoleState:
343
324
  @pulumi.getter
344
325
  def privileges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
345
326
  """
346
- The privileges to grant on the account role.
327
+ The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
347
328
  """
348
329
  return pulumi.get(self, "privileges")
349
330
 
@@ -374,9 +355,9 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
374
355
  always_apply: Optional[pulumi.Input[bool]] = None,
375
356
  always_apply_trigger: Optional[pulumi.Input[str]] = None,
376
357
  on_account: Optional[pulumi.Input[bool]] = None,
377
- on_account_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnAccountObjectArgs']]] = None,
378
- on_schema: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaArgs']]] = None,
379
- on_schema_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaObjectArgs']]] = None,
358
+ on_account_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']]] = None,
359
+ on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']]] = None,
360
+ on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']]] = None,
380
361
  privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
381
362
  with_grant_option: Optional[pulumi.Input[bool]] = None,
382
363
  __props__=None):
@@ -388,42 +369,37 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
388
369
  #### Grant all privileges OnAccountObject (Database)
389
370
 
390
371
  ```sh
391
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole `"\\"test_db_role\\"|false|false|ALL|OnAccountObject|DATABASE|\\"test_db\\""`
372
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|ALL|OnAccountObject|DATABASE|"test_db"'`
392
373
  ```
393
374
 
394
375
  #### Grant list of privileges OnAllSchemasInDatabase
395
376
 
396
377
  ```sh
397
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole `"\\"test_db_role\\"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|\\"test_db\\""`
378
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
398
379
  ```
399
380
 
400
381
  #### Grant list of privileges on table
401
382
 
402
383
  ```sh
403
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole \\"test_table\\""`
384
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
404
385
  ```
405
386
 
406
387
  #### Grant list of privileges OnAll tables in schema
407
388
 
408
389
  ```sh
409
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole \\"test_schema\\""`
390
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
410
391
  ```
411
392
 
412
393
  :param str resource_name: The name of the resource.
413
394
  :param pulumi.ResourceOptions opts: Options for the resource.
414
- :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
395
+ :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
415
396
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
416
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
417
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
418
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
419
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
420
- of the config being eventually convergent (producing an empty plan).
421
397
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
422
398
  :param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
423
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnAccountObjectArgs']] on_account_object: Specifies the account object on which privileges will be granted
424
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaArgs']] on_schema: Specifies the schema on which privileges will be granted.
425
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaObjectArgs']] on_schema_object: Specifies the schema object on which privileges will be granted.
426
- :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
399
+ :param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']] on_account_object: Specifies the account object on which privileges will be granted
400
+ :param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
401
+ :param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
402
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
427
403
  :param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
428
404
  """
429
405
  ...
@@ -440,25 +416,25 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
440
416
  #### Grant all privileges OnAccountObject (Database)
441
417
 
442
418
  ```sh
443
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole `"\\"test_db_role\\"|false|false|ALL|OnAccountObject|DATABASE|\\"test_db\\""`
419
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|ALL|OnAccountObject|DATABASE|"test_db"'`
444
420
  ```
445
421
 
446
422
  #### Grant list of privileges OnAllSchemasInDatabase
447
423
 
448
424
  ```sh
449
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole `"\\"test_db_role\\"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|\\"test_db\\""`
425
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
450
426
  ```
451
427
 
452
428
  #### Grant list of privileges on table
453
429
 
454
430
  ```sh
455
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole \\"test_table\\""`
431
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
456
432
  ```
457
433
 
458
434
  #### Grant list of privileges OnAll tables in schema
459
435
 
460
436
  ```sh
461
- $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole \\"test_schema\\""`
437
+ $ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
462
438
  ```
463
439
 
464
440
  :param str resource_name: The name of the resource.
@@ -481,9 +457,9 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
481
457
  always_apply: Optional[pulumi.Input[bool]] = None,
482
458
  always_apply_trigger: Optional[pulumi.Input[str]] = None,
483
459
  on_account: Optional[pulumi.Input[bool]] = None,
484
- on_account_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnAccountObjectArgs']]] = None,
485
- on_schema: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaArgs']]] = None,
486
- on_schema_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaObjectArgs']]] = None,
460
+ on_account_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']]] = None,
461
+ on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']]] = None,
462
+ on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']]] = None,
487
463
  privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
488
464
  with_grant_option: Optional[pulumi.Input[bool]] = None,
489
465
  __props__=None):
@@ -522,9 +498,9 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
522
498
  always_apply: Optional[pulumi.Input[bool]] = None,
523
499
  always_apply_trigger: Optional[pulumi.Input[str]] = None,
524
500
  on_account: Optional[pulumi.Input[bool]] = None,
525
- on_account_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnAccountObjectArgs']]] = None,
526
- on_schema: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaArgs']]] = None,
527
- on_schema_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaObjectArgs']]] = None,
501
+ on_account_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']]] = None,
502
+ on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']]] = None,
503
+ on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']]] = None,
528
504
  privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
529
505
  with_grant_option: Optional[pulumi.Input[bool]] = None) -> 'GrantPrivilegesToAccountRole':
530
506
  """
@@ -534,19 +510,14 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
534
510
  :param str resource_name: The unique name of the resulting resource.
535
511
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
536
512
  :param pulumi.ResourceOptions opts: Options for the resource.
537
- :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
513
+ :param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
538
514
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
539
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
540
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
541
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
542
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
543
- of the config being eventually convergent (producing an empty plan).
544
515
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
545
516
  :param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
546
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnAccountObjectArgs']] on_account_object: Specifies the account object on which privileges will be granted
547
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaArgs']] on_schema: Specifies the schema on which privileges will be granted.
548
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToAccountRoleOnSchemaObjectArgs']] on_schema_object: Specifies the schema object on which privileges will be granted.
549
- :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
517
+ :param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']] on_account_object: Specifies the account object on which privileges will be granted
518
+ :param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
519
+ :param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
520
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
550
521
  :param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
551
522
  """
552
523
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -569,7 +540,7 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
569
540
  @pulumi.getter(name="accountRoleName")
570
541
  def account_role_name(self) -> pulumi.Output[str]:
571
542
  """
572
- The fully qualified name of the account role to which privileges will be granted.
543
+ The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
573
544
  """
574
545
  return pulumi.get(self, "account_role_name")
575
546
 
@@ -584,13 +555,6 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
584
555
  @property
585
556
  @pulumi.getter(name="alwaysApply")
586
557
  def always_apply(self) -> pulumi.Output[Optional[bool]]:
587
- """
588
- If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
589
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
590
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
591
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
592
- of the config being eventually convergent (producing an empty plan).
593
- """
594
558
  return pulumi.get(self, "always_apply")
595
559
 
596
560
  @property
@@ -637,7 +601,7 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
637
601
  @pulumi.getter
638
602
  def privileges(self) -> pulumi.Output[Optional[Sequence[str]]]:
639
603
  """
640
- The privileges to grant on the account role.
604
+ The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
641
605
  """
642
606
  return pulumi.get(self, "privileges")
643
607